Category: Online Safety

In part II of the kinds of cyber threats users need to protect themselves against, Rayyan discusses four more commonly used attacks by hackers. The only way to protect ourselves is to enable a good Antivirus and be weary of where we put in our credit card details, our passwords and other personal details. Yes, the internet is convenient, but we must be armed with the right information before making an online decision. EAVESDROPPING Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For instance, programs such as Carnivore and NarusInSight have been used by the CBI and NIA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e., with no contact to the…

Author - Karthik Reddy With the exponential growth of online businesses, our personal and financial information has never been more at risk of cybercrimes. Although defences against these attacks are constantly being developed, so are the new ways to overcome them. There are many types of cybercrime. They include malware, compromised and stolen devices, web based attacks, malicious code and ransomware, to name a few. Most commonly online businesses are targeted, but it is also very common for medical and healthcare industries to be vulnerable to attacks. You can find out a lot more about the types of cybercrime and ways to protect against them at BestVPNs. Although the attacks are often successful, many businesses do a good job at protecting themselves. In 2016 alone, there were 144 million attacks…

In the year 2017, many news published by the mainstream media through their official social media handles, were reported to be fake. This year, we hope that less people fall prey to it. Please find below the listicle that is made as a ready reckoner for spotting fake news. The content on spotting fake news has been taken from Facebook’s Help Centre. Be skeptical of headlines – False news stories often have catchy headlines in all caps with exclamation points. If shocking claims in the headline sound unbelievable, they probably are. Look closely at the URL – A phony or look-alike URL may be a warning sign of false news. Many false news mimic authentic news sources by making small changes to the URL. You can go to the site…

Haven’t we all fantasized about being someone’s secret crush at some point or other? Hoping that boy who sat on the last bench in class wrote all that beautiful poetry with you as a muse? Or added that girl on Facebook who took your breath away during every debate competition but you got tongue-tied in front of her every single time? Well, this had to be it, right? The day and age of Sarahah and the garb of anonymity it came with allowing users to finally say all those things unsaid. So this was exciting, and most importantly, easy to use. You simply registered yourself, shared your sarahah link and you’re flooded with “honest” messages. It appealed to the narcissist in us, put us in a world where everything was…

College - John Mathai Centre City/State - Thrissur, Calicut, Kerala No of students - 95 Right at the epicentre of Thrissur is Vadakkumnathan temple, dedicated to Lord Shiva. We were to visit the University of Calicut for our first set of workshops in Kerala. Dr Shyjan Davis, professor of Economics at the university said that it was important for students across Kerala to know the necessity of taking safety precautions on the various social media platforms. He was keen to host this workshop for his students because he wanted them to know that when sharing information on social media, one must be extremely careful of who its being shared with. In addition to that one mustn't befriend everyone on facebook since the crime and bullying related to fake id's is…